Computerworld - Cryptography expert Martin Hellman, co-inventor of Diffie- Hellman public-key encryption, says he never encrypts his e-mail. It's just too much trouble.
"There's a lack of integrated, automatic, transparent crypto," says Hellman, professor emeritus of electrical engineering at Stanford University. "If security is an add-on that people have to do something special to get, then most of the time they will not get it."
But there are developments afoot that during the next five years may bring some of the integration, automation and transparency Hellman is looking for.
"Cryptographic operations will disappear into the infrastructure," predicts Tom Berson, a principal scientist at Palo Alto Research Center Inc. (PARC) in California. "The complexities of cryptography and of cryptographic key management will be hidden from users."
Encryption will be seamlessly integrated into virtually every computing device and piece of communications software, Berson says.
And it will happen not a moment too soon. Increased connectivity in general and the rapid rise in wireless communications in particular are leaving users with files, messages and telephone conversations vulnerable to loss of privacy and confidentiality.
PARC researchers have several projects under way to encourage the use of encryption. One, called Quicksilver, is a program aimed at convincing vendors and users that cryptography is no longer slow and difficult to use. In its Quicksilver Manifesto, PARC exhorts users to "demand that your interests take priority over obsolete beliefs about what can and cannot be done to secure your information."
PARC is also working on making encryption more user-friendly. For example, it has proposed an intuitive scheme for user authentication in ad hoc wireless networks. The scheme uses public-key cryptography, but without a public-key infrastructure (PKI) that requires users to have digital certificates signed by a trusted third party.
"The problem with PKI is the I, not the PK," says PARC researcher Diana Smetters.
Stanford researcher Dan Boneh is developing a public-key system based on Identity-Based Encryption, by which users can use their e-mail addresses as their public keys. Recipients of e-mail encrypted by the system wouldn't need pre-established keys or certificates. The system would also allow the creation of messages that can be read only at a specified future time.
And Anna Lysyanskaya, a computer science graduate student at MIT, is working with IBM to develop privacy-oriented "anonymous credentials." For example, users could sign up for an online service without divulging their identities. The service provider could verify that a user is registered, but it couldn't track his activities and track them back to him.
Years of Development
Encryption is based on complex mathematics, and it often takes years for experts to satisfy themselves that there are no serious flaws in a cryptosystem. For example, the new federal Advanced Encryption Standard (AES) algorithm, which is replacing the old, less secure Data Encryption Standard, is based on techniques developed in the mid-1990s. But the U.S. Department of Defense won't widely deploy AES cryptography until 2007.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!